Главная
Study mode:
on
1
Introduction
2
About me
3
AirGap result
4
Presentation
5
AirGap Isolation
6
Physical Media
7
Private Key
8
Simple Data
9
Audio Gap
10
Computer
11
Computer Fans
12
Demonstration
13
Jump
14
Computer Modulation
15
Houdini
16
Denis
Description:
Explore the world of 'Bridgeware' malware and its ability to overcome air-gap isolation in this 24-minute Black Hat conference talk. Delve into various covert channels proposed over the years, including electromagnetic, magnetic, acoustic, thermal, electrical, and optical methods. Discover a new air-jumping technique from recent research. Learn about the challenges of air-gap isolation, physical media vulnerabilities, and the risks to private keys and sensitive data. Witness demonstrations of audio gap exploitation, computer fan manipulation, and the intricacies of computer modulation. Gain insights into the Houdini-like escape tactics employed by sophisticated malware to breach even the most secure systems.

The Air-Gap Jumpers

Black Hat
Add to list
0:00 / 0:00